{"id":10006,"date":"2026-01-15T19:48:36","date_gmt":"2026-01-15T16:48:36","guid":{"rendered":"https:\/\/int-teamdc.moomkn.us\/?post_type=tribe_events&#038;p=10006"},"modified":"2026-01-15T19:52:05","modified_gmt":"2026-01-15T16:52:05","slug":"cybercrime-simulation-and-prevention-strategies","status":"publish","type":"tribe_events","link":"https:\/\/int-teamdc.moomkn.us\/?tribe_events=cybercrime-simulation-and-prevention-strategies","title":{"rendered":"Cybercrime simulation and prevention strategies"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"template":"","meta":{"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[83],"class_list":["post-10006","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-workshops","cat_workshops"],"_links":{"self":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events\/10006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events\/10006\/revisions"}],"wp:attachment":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10006"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10006"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftribe_events_cat&post=10006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}